Video Conference Details

Next class starting

Training Session Details

There will be 10 online sessions, each session being of 2.5 hours. Every session will have presentation about theory, concepts and technology, followed by Hands-on Lab practice exercises.

Training Dates

Begins December 2, taught over 5 weekends ending December 31

Sat and Sun 8:00 AM - 10:30 AM (US Pacific Time)

Class dates: December 2,3,9,10,16,17,23,24,30,31

Each session will be recorded and the recordings will be shared after each session with students.

The Certified Ethical Hacker V9 Class

Introduction

The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, To beat a hacker, you need to think like a hacker. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.

This ethical hacking course puts you in the drivers seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and taught how you can approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks!

Target Audience

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Prerequisites

The knowledge and skills that a learner must have before attending this course is as follows:

There is a minimum age requirement that applies and attendance of the Ethical Hacking and Countermeasures training course or attempts at the relevant exam, is restricted to candidates who are at least 18 years old.

Why Certified Ethical Hacker Training from CybersecurityEdX ?

Our CEH training is very hands on. You will use Virtual images including Kali Linux image for practical lab exercises.

Our Instructors are EC Council Certified Ethical Hackers and penetration testers who actively work on helping the police and Government with cybercrimes.

Employees of Microsoft, Dept. of Homeland Security, TD Ameritrade, a Minnesota county and other companies have taken our classes.

Course Objectives

Upon completing this course, the learner will be able to:

Master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

Course Content

1. Introduction to Ethical Hacking

Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds

Information Security Overview

Information Security Threats and Attack Vectors

Hacking Concepts, Types and Phases

Ethical Hacking Concepts and Scope

Information Security Controls

Information Security Laws and Standards

2.Footprinting and Reconnaissance

Footprinting Concepts

Footprinting Methodology

Footprinting Tools

Footprinting Countermeasures

Footprinting Penetration Testing

3. Scanning Networks

Overview of Network Scanning

CEH Scanning Methodology

Scanning Beyond IDS

Banner Grabbing

Scan for Vulnerability

Draw Network Diagrams

Prepare Proxies

Scanning Pen Testing

4.Enumeration

Enumeration Concepts

NetBIOS Enumeration

SNMP Enumeration

LDAP Enumeration

NTP Enumeration

SMTP Enumeration

Enumeration Countermeasures

SMB Enumeration Countermeasures

Enumeration Pen Testing

5. System Hacking

Information at Hand Before System Hacking Stage

System Hacking: Goals

CEH Hacking Methodology (CHM)

CEH System Hacking Steps

Hiding Files

Covering Tracks

Penetration Testing

6. Malware Threats

Introduction to Malware

Trojan Concepts

Types of Trojans

Virus and Worms Concepts

Malware Reverse Engineering

Malware Detection

Countermeasures

Anti-Malware Software

Penetration Testing

7.Sniffing

Sniffing Concepts

MAC Attacks

DHCP Attacks

ARP Poisoning

Spoofing Attack

DNS Poisoning

Sniffing Tools

Sniffing Tool: Wireshark

Follow TCP Stream in Wireshark

Display Filters in Wireshark

Additional Wireshark Filters

Packet Sniffing Tool: Capsa Network Analyzer

Network Packet Analyzer

Counter measures

Sniffing Detection Techniques

Sniffing Pen Testing

8.Social Engineering

Social Engineering Concepts

Social Engineering Techniques

Impersonation on Social Networking Site

Identity Theft

Social Engineering Countermeasures

Penetration Testing

9.Denial of Service

DoS/DDoS Concepts

DoS/DDoS Attack Techniques

Botnets

DDoS Case Study

DoS/DDoS Attack Tools

Counter-measures

DoS/DDoS Protection Tools

DoS/DDoS Attack Penetration Testing

10.Session Hijacking

Session Hijacking Concepts

Application Level Session Hijacking

Network-level Session Hijacking

Session Hijacking Tools

Counter-measures

Session Hijacking Pen Testing

11.Hacking Web Servers

Webserver Concepts

Webserver Attacks

Attack Methodology

Webserver Attack Tools

Counter-measures

Patch Management

Webserver Security Tools

Webserver Pen Testing

12.Hacking Web Applications

Web App Concepts

Web App Threats

Web App Hacking Methodology

Web Application Hacking Tools

Countermeasures

Security Tools

Web App Pen Testing

13.SQL Injection

SQL Injection Concepts

Types of SQL Injection

SQL Injection Methodology

SQL Injection Tools

Evasion Techniques

Counter-measures

14.Hacking Wireless Networks

Wireless Concepts

Wireless Encryption

Wireless Threats

Wireless Hacking Methodology

Wireless Hacking Tools

Bluetooth Hacking

Counter-measures

Wireless Security Tools

Wi-Fi Pen Testing

15.Hacking Mobile Platforms

Mobile Platform Attack Vectors

Hacking Android OS

Hacking iOS

Hacking Windows Phone OS

Hacking BlackBerry

Mobile Device Management (MDM)

Mobile Security Guidelines and Tools

Mobile Pen Testing

16. Evading IDS, Firewalls and Honeypots

IDS, Firewall and Honeypot Concepts

IDS, Firewall and Honeypot System

Evading IDS

Evading Firewalls

IDS/Firewall Evading Tools

Detecting Honeypots

IDS/Firewall Evasion Counter-measures

Penetration Testing

17. Cloud Computing

Introduction to Cloud Computing

Cloud Computing Threats

Cloud Computing Attacks

Cloud Security

Cloud Security Tools

Cloud Penetration Testing

18. Cryptography

Market Survey 2014: The Year of Encryption

Case Study: Heartbleed

Case Study: Poodlebleed

Cryptography Concepts

Encryption Algorithms

Cryptography Tools

Public Key Infrastructure (PKI)

Email Encryption

Disk Encryption

Cryptography Attacks

Cryptanalysis Tools

Class Size:Maximum 22

Refund Policy

1. There will be no refunds.2. If a class is not taken for any reason, rescheduled or cancelled, purchase price can be applied toward any published future class by Omni212 of equal or lesser value.

Disclaimer

This is not an EC Council Certified class. This is not being taught by an EC Council Accredited Training Center. However we help you prepare for the Certified Ethical Hacker (CEH) V9 exam. Our instructors are EC Council Certified Ethical Hackers and Instructors. In order to take the exam, these are the qualifications:

1. Either demonstrate a verifiable experience (Education + Work experience) of at least 2 years in Information security.

OR

2. Take a Certified Ethical Hacker V9 training from an EC Council Certified Accredited Training Center which costs around $2,500. This price includes the CEH exam voucher.